Download Now Free registration required
The goal of ubiquitous computing research is re ne devices to the point where their use is transparent. For many applications with mobile devices, transparent operation requires that the device be location aware. Unfortunately, the location of an individual can be used to infer highly private information. Hence, these devices must be carefully designed, lest they become a ubiquitous surveillance system. This paper overviews existing location-sensing mobile devices, vectors for a privacy invasion, and proposed solutions. Particular attention is paid to required infrastructure and the accuracy of the location information which can be stolen.
- Format: PDF
- Size: 94 KB